Compare commits
1 Commits
44b8c9d4a3
...
48752c9549
Author | SHA1 | Date |
---|---|---|
Oystein Kristoffer Tveit | 48752c9549 |
3
base.nix
3
base.nix
|
@ -174,6 +174,7 @@
|
||||||
extraConfig = "return 444;";
|
extraConfig = "return 444;";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# TODO: upstream
|
||||||
# source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service
|
# source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service
|
||||||
systemd.services.logrotate = {
|
systemd.services.logrotate = {
|
||||||
documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ];
|
documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ];
|
||||||
|
@ -210,6 +211,8 @@
|
||||||
SystemCallArchitectures = "native";
|
SystemCallArchitectures = "native";
|
||||||
SystemCallFilter = [
|
SystemCallFilter = [
|
||||||
"@system-service"
|
"@system-service"
|
||||||
|
# "~@privileged"
|
||||||
|
# "~@resources"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -31,7 +31,7 @@ in
|
||||||
PrivateMounts = true;
|
PrivateMounts = true;
|
||||||
ProtectClock = true;
|
ProtectClock = true;
|
||||||
ProtectControlGroups = true;
|
ProtectControlGroups = true;
|
||||||
ProtectHome = true;
|
ProtectHome = true; # Needed to read passwords from /run maybe?
|
||||||
ProtectHostname = true;
|
ProtectHostname = true;
|
||||||
ProtectKernelLogs = true;
|
ProtectKernelLogs = true;
|
||||||
ProtectKernelModules = true;
|
ProtectKernelModules = true;
|
||||||
|
@ -45,6 +45,8 @@ in
|
||||||
KeyringMode = "private";
|
KeyringMode = "private";
|
||||||
SystemCallFilter = [
|
SystemCallFilter = [
|
||||||
"@system-service"
|
"@system-service"
|
||||||
|
# "~@privileged"
|
||||||
|
# "~@resources"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
|
|
|
@ -71,6 +71,8 @@ in {
|
||||||
AmbientCapabilities = [ "" ];
|
AmbientCapabilities = [ "" ];
|
||||||
CapabilityBoundingSet = [ "" ];
|
CapabilityBoundingSet = [ "" ];
|
||||||
DeviceAllow = [ "" ];
|
DeviceAllow = [ "" ];
|
||||||
|
# IPAddressDeny = [ "any" ];
|
||||||
|
# IPAddressAllow = [ ];
|
||||||
LockPersonality = true;
|
LockPersonality = true;
|
||||||
NoNewPrivileges = true;
|
NoNewPrivileges = true;
|
||||||
# MemoryDenyWriteExecute = true;
|
# MemoryDenyWriteExecute = true;
|
||||||
|
|
Loading…
Reference in New Issue